Prerequisites
- Dr.Semu is properly installed (see Installation)
- You have administrator privileges
- Target sample is a Windows PE executable (.exe)
Basic Analysis Workflow
Step 1: Prepare Your Sample
Place your malware sample in a dedicated directory:Step 2: Run the Analysis
Open a command prompt as Administrator and execute:Step 3: Monitor the Analysis
During analysis, you’ll see real-time output in the console:What’s Happening?
- Virtual FS/REG initialization: Creates an isolated filesystem and registry
- Fake Explorer launch: Starts a fake
explorer.exeto simulate a real environment - Target execution: Runs your sample under DynamoRIO instrumentation
- Process tracking: Monitors the sample and any child processes it creates
Step 4: Wait for Completion
The analysis runs until:- All processes terminate naturally, OR
- The time limit is reached (default: 120 seconds)
Step 5: Review Results
After completion, a modal dialog shows the verdict:Advanced Analysis Options
Custom Time Limit
For samples that need longer execution:Passing Command-Line Arguments
Some malware requires specific arguments:Analyzing Droppers
For droppers that create child processes:Understanding Console Output
VM Instance Information
VM_1,VM_2, etc. indicate separate VM instances- When analyzing directories, each file gets its own VM
Process Lifecycle
Analysis Duration
Fake Explorer
explorer.exe to simulate a realistic Windows environment. This helps detect malware that checks for the Explorer process.
Report Generation
Dr.Semu generates JSON reports for:- Each monitored process:
<PID>.json - Analysis metadata:
starter.json
starter.json:
Reports are generated in a temporary directory with a random name (e.g.,
xK3mP9nB2qR5vL7) and are deleted after scanning unless you preserve them manually.Common Scenarios
Scenario 1: Packed Malware
Packed samples may need more time to unpack:Scenario 2: Malware with Anti-Analysis
Some malware checks for sandboxes. Dr.Semu’s virtual FS/REG helps evade detection:Scenario 3: Ransomware
Ransomware typically:- Enumerates drives
- Creates encryption keys
- Modifies files
Scenario 4: Information Stealers
Look for network activity and registry queries:Troubleshooting
”No such file/directory”
Ensure the path is correct and the file exists:“Invalid file extension”
Dr.Semu only accepts.exe files. If you have a DLL or other format, you’ll need to use a different analysis approach.
Analysis Hangs
If the analysis appears stuck:- Check if processes are still running (look for
PID: ...output) - Wait for the time limit to expire
- If completely frozen, kill
drrun.exeprocesses
”Failed to create a slot”
This indicates IPC issues. Try:- Running as Administrator
- Restarting the analysis
- Checking for antivirus interference
Best Practices
Always Use Time Limits
Always Use Time Limits
Set appropriate time limits based on sample type:
- Simple droppers: 120 seconds (default)
- Installers: 300 seconds
- Complex malware: 600+ seconds
Preserve Reports
Preserve Reports
Copy reports before the modal closes:
Run in Isolated Environment
Run in Isolated Environment
Even with virtualization, analyze malware in:
- Dedicated analysis VM
- Air-gapped network
- Snapshotted system
Monitor Resource Usage
Monitor Resource Usage
Some malware is resource-intensive. Monitor:
- CPU usage
- Disk I/O
- Memory consumption
Next Steps
Batch Analysis
Analyze multiple samples efficiently
Understanding Reports
Deep dive into JSON report structure